That malware knows that they are watching it

It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they

When money was not everything in malware

Although for many it’s hard to believe, there was a time when malware was not a tool created to generate as much money as possible. The main motivations of those old-school hackers were such earthly things as fun or some

Steganography, cannot see the trees for the forest

The hiding of information in places that initially seem innocuous has been and is a widely used method. The biggest advantage of steganography is that sent messages can go completely unnoticed, since no one can think that they hide something

Backdoors, I don’t remember opening that door

Although many people have never heard of them, backdoors are one of the most frequently methods used nowadays to perform malicious attacks. Leaving aside the specific case of the backdoors in cryptographic algorithms, backdoors allows access to a particular computer

Exploit kits, loved and hated in equal measure

Exploit kits are the cause of a large percentage of malware infections that occur nowadays. Depending on the side where you are, you will consider exploit kits a godsend or a hellish curse. They are toolsets to automatically exploit vulnerabilities on the client

Malicious apps exist and live among us

Malware on mobile devices is very common. Although this is something quite obvious to anyone in the world of security, many people still think that their smartphone or tablet this out of any danger. Lately the Android world has gone through difficult times,

Dynamically detecting and classifying malware

Performing a dynamic analysis of a malware sample is quick and can bring large amounts of data to perform a more complete and complex manual analysis. There are many sandboxes (controlled environments) that analyze a binary to know what exactly

Documents as or more malicious than executables

Although controlling the executables receives either in an email or through a download is good, we must not forget that the forest is full of foxes. Simply opening a Word or PDF document, for example, harmless at first sight, we

Reverse engineering on protected malware

Over time, we analyze many malware samples using reverse engineering to obtain and understand their real functionality. This process is an arduous task that may take some time depending on the complexity of the malware itself and the packer or packers used